{"id":"https://openalex.org/W4391806003","doi":"https://doi.org/10.1515/jmc-2023-0028","title":"On the Black-Box impossibility of multi-designated verifiers signature schemes from ring signature schemes","display_name":"On the Black-Box impossibility of multi-designated verifiers signature schemes from ring signature schemes","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4391806003","doi":"https://doi.org/10.1515/jmc-2023-0028"},"language":"en","primary_location":{"id":"doi:10.1515/jmc-2023-0028","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2023-0028","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2023-0028/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2023-0028/pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087190591","display_name":"Kyosuke Yamashita","orcid":"https://orcid.org/0000-0001-7998-8039"},"institutions":[{"id":"https://openalex.org/I73613424","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54","country_code":"JP","type":"government","lineage":["https://openalex.org/I73613424"]},{"id":"https://openalex.org/I98285908","display_name":"The University of Osaka","ror":"https://ror.org/035t8zc32","country_code":"JP","type":"education","lineage":["https://openalex.org/I98285908"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Kyosuke Yamashita","raw_affiliation_strings":["Cyber Physical Security Research Center, National Institute of Advanced Industrial Science and Technology , Tokyo , Japan","The Graduate School of Information Science and Technology, Osaka University , Osaka , Japan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Cyber Physical Security Research Center, National Institute of Advanced Industrial Science and Technology , Tokyo , Japan","institution_ids":["https://openalex.org/I73613424"]},{"raw_affiliation_string":"The Graduate School of Information Science and Technology, Osaka University , Osaka , Japan","institution_ids":["https://openalex.org/I98285908"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042722091","display_name":"Keisuke Hara","orcid":"https://orcid.org/0000-0003-3598-0988"},"institutions":[{"id":"https://openalex.org/I180203408","display_name":"Yokohama National University","ror":"https://ror.org/03zyp6p76","country_code":"JP","type":"education","lineage":["https://openalex.org/I180203408"]},{"id":"https://openalex.org/I73613424","display_name":"National Institute of Advanced Industrial Science and Technology","ror":"https://ror.org/01703db54","country_code":"JP","type":"government","lineage":["https://openalex.org/I73613424"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Keisuke Hara","raw_affiliation_strings":["Cyber Physical Security Research Center, National Institute of Advanced Industrial Science and Technology , Tokyo , Japan","Graduate School of Environment and Information Sciences, Yokohama National University , Yokohama , Japan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Cyber Physical Security Research Center, National Institute of Advanced Industrial Science and Technology , Tokyo , Japan","institution_ids":["https://openalex.org/I73613424"]},{"raw_affiliation_string":"Graduate School of Environment and Information Sciences, Yokohama National University , Yokohama , Japan","institution_ids":["https://openalex.org/I180203408"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5087190591"],"corresponding_institution_ids":["https://openalex.org/I73613424","https://openalex.org/I98285908"],"apc_list":{"value":1000,"currency":"EUR","value_usd":1078},"apc_paid":{"value":1000,"currency":"EUR","value_usd":1078},"fwci":1.627,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.85008034,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":"18","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9864000082015991,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/impossibility","display_name":"Impossibility","score":0.8821781873703003},{"id":"https://openalex.org/keywords/ring-signature","display_name":"Ring signature","score":0.8804097175598145},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.7785189151763916},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.7080919742584229},{"id":"https://openalex.org/keywords/ring","display_name":"Ring (chemistry)","score":0.6726366281509399},{"id":"https://openalex.org/keywords/elgamal-signature-scheme","display_name":"ElGamal signature scheme","score":0.5538121461868286},{"id":"https://openalex.org/keywords/black-box","display_name":"Black box","score":0.539371132850647},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.5344957709312439},{"id":"https://openalex.org/keywords/merkle-signature-scheme","display_name":"Merkle signature scheme","score":0.48058342933654785},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4734330177307129},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4606810212135315},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33807802200317383},{"id":"https://openalex.org/keywords/blind-signature","display_name":"Blind signature","score":0.30431801080703735},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.30105292797088623},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1971757709980011},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12087327241897583},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.08027291297912598},{"id":"https://openalex.org/keywords/geometry","display_name":"Geometry","score":0.055881232023239136}],"concepts":[{"id":"https://openalex.org/C2776261394","wikidata":"https://www.wikidata.org/wiki/Q315562","display_name":"Impossibility","level":2,"score":0.8821781873703003},{"id":"https://openalex.org/C168941894","wikidata":"https://www.wikidata.org/wiki/Q3483645","display_name":"Ring signature","level":4,"score":0.8804097175598145},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.7785189151763916},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.7080919742584229},{"id":"https://openalex.org/C2780378348","wikidata":"https://www.wikidata.org/wiki/Q25351438","display_name":"Ring (chemistry)","level":2,"score":0.6726366281509399},{"id":"https://openalex.org/C132860680","wikidata":"https://www.wikidata.org/wiki/Q1328731","display_name":"ElGamal signature scheme","level":5,"score":0.5538121461868286},{"id":"https://openalex.org/C94966114","wikidata":"https://www.wikidata.org/wiki/Q29256","display_name":"Black box","level":2,"score":0.539371132850647},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.5344957709312439},{"id":"https://openalex.org/C40404285","wikidata":"https://www.wikidata.org/wiki/Q1921816","display_name":"Merkle signature scheme","level":5,"score":0.48058342933654785},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4734330177307129},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4606810212135315},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33807802200317383},{"id":"https://openalex.org/C18899389","wikidata":"https://www.wikidata.org/wiki/Q2736593","display_name":"Blind signature","level":4,"score":0.30431801080703735},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.30105292797088623},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1971757709980011},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12087327241897583},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.08027291297912598},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.055881232023239136},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C178790620","wikidata":"https://www.wikidata.org/wiki/Q11351","display_name":"Organic chemistry","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1515/jmc-2023-0028","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2023-0028","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2023-0028/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:2e08d5e4a6484e35be4e00d7c7aff274","is_oa":false,"landing_page_url":"https://doaj.org/article/2e08d5e4a6484e35be4e00d7c7aff274","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Mathematical Cryptology, Vol 18, Iss 1, Pp 495-507 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/jmc-2023-0028","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2023-0028","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2023-0028/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7519076097","display_name":null,"funder_award_id":"JPMJCR22M1","funder_id":"https://openalex.org/F4320338075","funder_display_name":"Core Research for Evolutional Science and Technology"}],"funders":[{"id":"https://openalex.org/F4320338075","display_name":"Core Research for Evolutional Science and Technology","ror":"https://ror.org/00097mb19"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4391806003.pdf"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W49963653","https://openalex.org/W1484668983","https://openalex.org/W1499074627","https://openalex.org/W1500682127","https://openalex.org/W1514176144","https://openalex.org/W1533905858","https://openalex.org/W1578523247","https://openalex.org/W1584840928","https://openalex.org/W1586506147","https://openalex.org/W1603523225","https://openalex.org/W1826437507","https://openalex.org/W1864936342","https://openalex.org/W2039422533","https://openalex.org/W2126193037","https://openalex.org/W2143188769","https://openalex.org/W2155299787","https://openalex.org/W2166980335","https://openalex.org/W2295912671","https://openalex.org/W2798365580","https://openalex.org/W3114650887","https://openalex.org/W3165739159","https://openalex.org/W3187030721","https://openalex.org/W4285166745","https://openalex.org/W4286758966","https://openalex.org/W4365808215","https://openalex.org/W4381432581"],"related_works":["https://openalex.org/W2375435031","https://openalex.org/W1881844432","https://openalex.org/W2378301157","https://openalex.org/W2126213311","https://openalex.org/W2022848027","https://openalex.org/W1516180578","https://openalex.org/W2121653736","https://openalex.org/W2368908838","https://openalex.org/W2388767540","https://openalex.org/W2389852181"],"abstract_inverted_index":{"Abstract":[0],"From":[1],"the":[2,57,64,67,72,76,84,102],"work":[3],"by":[4],"Laguillaumie":[5],"and":[6,100],"Vergnaud":[7],"in":[8,28,31,52],"ICICS\u201904,":[9],"it":[10,39],"has":[11,104],"been":[12,105],"widely":[13],"believed":[14],"that":[15,38],"multi-designated":[16],"verifiers":[17],"signature":[18,26,50,98],"scheme":[19,46,51,94],"(MDVS)":[20],"can":[21],"be":[22],"constructed":[23],"from":[24,47,63,91],"ring":[25,49,97],"schemes":[27],"general.":[29],"However,":[30],"this":[32],"article,":[33],"somewhat":[34],"surprisingly,":[35],"we":[36],"prove":[37],"is":[40],"impossible":[41],"to":[42,95],"construct":[43],"an":[44,92],"MDVS":[45,93],"a":[48,53,96,108],"black-box":[54],"sense":[55],"(in":[56],"standard":[58],"model).":[59],"The":[60],"impossibility":[61,103],"stems":[62],"difference":[65],"between":[66],"definitions":[68],"of":[69,71,78],"unforgeability":[70],"two":[73],"schemes.":[74],"To":[75],"best":[77],"our":[79],"knowledge,":[80],"existing":[81],"works":[82],"demonstrating":[83],"constructions":[85],"do":[86],"not":[87],"provide":[88],"formal":[89],"reductions":[90],"scheme,":[99],"thus,":[101],"overlooked":[106],"for":[107],"long":[109],"time.":[110]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2024-02-15T00:00:00"}
